Which of the following NIST documents will guide you?
You work as a security engineer for BlueWell Inc. You want to use some techniques and
procedures to verify the effectiveness of security controls in Federal Information System. Which of
the following NIST documents will guide you?
Which policy does this pertain to?
An organization monitors the hard disks of its employees’ computers from time to time. Which
policy does this pertain to?
Which of the following methods will you use to accomplish these tasks?
You work as a CSO (Chief Security Officer) for Tech Perfect Inc. You want to perform the following
tasks: Develop a risk-driven enterprise information security architecture. Deliver security
infrastructure solutions that support critical business initiatives. Which of the following methods will
you use to accomplish these tasks?
which of the following IDS evasion attacks does an attacker send a data packet such that IDS accepts the data
In which of the following IDS evasion attacks does an attacker send a data packet such that IDS
accepts the data packet but the host computer rejects it?
What are the different types of policies?
A security policy is an overall general statement produced by senior management that dictates
what role security plays within the organization. What are the different types of policies? Each
correct answer represents a complete solution. Choose all that apply.
Which of the following are the types of intellectual property?
Which of the following are the types of intellectual property? Each correct answer represents a
complete solution. Choose all that apply.
Which of the following are types of security controls?
Security controls are safeguards or countermeasures to avoid, counteract, or minimize security
risks. Which of the following are types of security controls? Each correct answer represents a
complete solution. Choose all that apply.
which of the following phases of the SDLC does the software and other components of the system …?
In which of the following phases of the SDLC does the software and other components of the
system faithfully incorporate the design specifications and provide proper documentation and
training?
Which of the following will you use to resolve the issue?
You work as a Security Manager for Tech Perfect Inc. You find that some applications have failed
to encrypt network traffic while ensuring secure communications in the organization. Which of the
following will you use to resolve the issue?
Which of the following are the components of the Intellectual Property law?
The rights of an author or a corporation to make profit from the creation of their products (such as
software, music, etc.) are protected by the Intellectual Property law. Which of the following are the
components of the Intellectual Property law? Each correct answer represents a part of the
solution. Choose two.
